Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121110-20609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.20738.x86fre.win7_ldr.100618-1621
Machine Name:
Kernel base = 0x8280a000 PsLoadedModuleList = 0x82953890
Debug session time: Sat Dec 11 13:52:13.094 2010 (UTC - 5:00)
System Uptime: 1 days 12:21:41.175
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..............................
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: b58e0fc8, address trying to free
Arg2: b58e0791, address where one bit is corrupted
Arg3: 0021403c, (reserved)
Arg4: 00000032, caller is freeing an address where nearby bytes within the same page have a single bit error
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** ERROR: Module load completed but symbols could not be loaded for dxgkrnl.sys
BUGCHECK_STR: 0xC1_32
SPECIAL_POOL_CORRUPTION_TYPE: 32
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 828f1393 to 828e94e8
STACK_TEXT:
97739438 828f1393 000000c1 b58e0fc8 b58e0791 nt!KeBugCheckEx+0x1e
9773945c 828f1e79 b58e0fc8 b58e0000 b58e0fc8 nt!MiCheckSpecialPoolSlop+0x6e
9773953c 8292a0db b58e0fc8 b58e0fc8 b58e0fc8 nt!MmFreeSpecialPool+0x15b
977395a4 82b3bf90 b58e0fc8 00000000 00000000 nt!ExFreePoolWithTag+0xd6
977395b8 92495a90 b58e0fc8 00000000 977395e8 nt!VerifierExFreePoolWithTag+0x30
WARNING: Stack unwind information not available. Following frames may be wrong.
977395c8 9254b90b b58e0fc8 00000001 88ed6f58 nvlddmkm+0x8fa90
977395e8 92562da5 c1d00001 caf0078f 00000000 nvlddmkm+0x14590b
977396b8 9252ef18 c1d00001 ff010000 82076418 nvlddmkm+0x15cda5
977397ac 92530f2a 88ed6f58 97739828 00000000 nvlddmkm+0x128f18
97739834 924c0f0a 00000000 8a360000 9773987c nvlddmkm+0x12af2a
97739850 924c1ddb 9773987c 00000098 b1c2ad00 nvlddmkm+0xbaf0a
97739864 9242c781 9773987c 8a360000 b1c2ad00 nvlddmkm+0xbbddb
97739918 9242e037 8a360000 b1c2ad00 00000000 nvlddmkm+0x26781
977399cc 92430317 b1c2ad00 97739a08 9242e4f1 nvlddmkm+0x28037
977399d8 9242e4f1 00000001 97739a60 8a360000 nvlddmkm+0x2a317
97739a08 929711bb 97739a60 82c206ee 88806000 nvlddmkm+0x284f1
97739a20 92eab91e 92971190 97739a60 00000001 nvlddmkm+0x56b1bb
97739a48 92eaa8b4 97739a60 98285b40 98285108 dxgkrnl+0x2591e
97739abc 92ea8481 85f6a1c8 00000000 af362fd0 dxgkrnl+0x248b4
97739ae4 92eaa95e 00000001 00000000 00000000 dxgkrnl+0x22481
97739b08 92eaad6e 00000000 00000000 a75d9760 dxgkrnl+0x2495e
97739b64 92eab594 97739b98 00000001 05999e02 dxgkrnl+0x24d6e
97739d28 8284c85a 031def40 031def64 772264f4 dxgkrnl+0x25594
97739d28 772264f4 031def40 031def64 772264f4 nt!KiFastCallEntry+0x12a
031def64 00000000 00000000 00000000 00000000 0x772264f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+8fa90
92495a90 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: nvlddmkm+8fa90
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c379162
FAILURE_BUCKET_ID: 0xC1_32_VRF_nvlddmkm+8fa90
BUCKET_ID: 0xC1_32_VRF_nvlddmkm+8fa90
Followup: MachineOwner
---------